QUESTION 20Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. You have a computer named Computer1 that runs Windows 10.File History is turned on.The user of Computer1 reports that previous versions of D:\Folder\File1 doc are unavailable from the Previous Versions tab.You need to ensure that the previous versions of the file are created Solution: Create a backup of drive D by using Backup and Restore (Windows 7) Does this meet the goal?

QUESTION 21Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. You have a computer named Computer1 that runs Windows 10.File History is turned on.The user of Computer1 reports that previous versions of D:\Folder\File1 doc are unavailable from the Previous Versions tab.You need to ensure that the previous versions of the file are created Solution: Add D:\Folder\to the Documents library.Does this meet the goal?

QUESTION 22Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. A user named User1 is a member of the local Administrators group on Computer1 and Computer2. User1 fails to access the Event Viewer logs on Computer 2 from Computer 1.User1 can connect to Computed remotely by using Computer Management.You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer 2.Solution: You run Enable-PSRemoting on Computer 1.Does this meet the goal?

QUESTION 23Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution. Determine whether the solution meets the stated goals. A user named User1 is a member of the local Administrators group on Computer1 and Computer2. User1 fails to access the Event Viewer logs on Computer 2 from Computer 1.User1 can connect to Computed remotely by using Computer Management.You need to ensure that User1 can use Event Viewer on Computer1 to remotely view the Event Viewer logs on Computer 2.Solution: You run winrm quick config on Computer2.Does this meet the goal?

QUESTION 24Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.Start of repeated scenarioYour network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:– Ensure that you can test unsigned device drivers on Computer1 – Enable Credential Guard on Computer2.– Run commands and cmdlets remotely on computer2.– Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.– Ensure that User1 can view and interact with a desktop session of User3. – Ensure that User2 can use Telnet to manage the mainframe.– Ensure that User4 can use Remote Desktop to access Computer4 remotely.End of repeated scenario.You need to configure Computer3 to meet the UAC requirement. What should you use?

A. User Account Control SettingsB. Credential ManagerC. Security Options in the Computer Configuration of the Local Computer Policy.D. Security Settings in the User Computer of the Local Computer Policy.

QUESTION 25Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.Start of repeated scenarioYour network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:– Ensure that you can test unsigned device drivers on Computer1 – Enable Credential Guard on Computer2.– Run commands and cmdlets remotely on computer2.– Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.– Ensure that User1 can view and interact with a desktop session of User3. – Ensure that User2 can use Telnet to manage the mainframe.– Ensure that User4 can use Remote Desktop to access Computer4 remotely.End of repeated scenario.On Test_Server, you reset the password for User3. You need to ensure that User3 can access ShareA. Which tool should you instruct User3 to use on Computer3?

QUESTION 26Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.Start of repeated scenarioYour network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:– Ensure that you can test unsigned device drivers on Computer1 – Enable Credential Guard on Computer2.– Run commands and cmdlets remotely on computer2.– Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.– Ensure that User1 can view and interact with a desktop session of User3. – Ensure that User2 can use Telnet to manage the mainframe.– Ensure that User4 can use Remote Desktop to access Computer4 remotely.End of repeated scenario.You need to meet the Credential Guard requirement of Computer2. Which two Windows features should you install? Each correct answer presents part of the solution.

QUESTION 27Note: This question is part of a series of questions that use the same scenario. For your convenience, the scenario is repeated in each question. Each question presents a different goal and answer choices, but the text of the scenario is exactly the same in each question in this series.

Your network contains a single Active Directory domain named adatum.com. The network contains five servers configured as shown in the following table.All of the servers run Windows Server 2012 R2.Test_Server has a shared folder named ShareA. Only local users have permissions to ShareA. The network contains a mainframe computer that is administered by using the Telnet protocol. The domain contains four client computers configured as shown in the following table.All of the client computers run the 64-bit version of Windows. User3 frequently accesses ShareA.Remote Desktop is enabled on Computer4.Your company identifies the following requirements:– Ensure that you can test unsigned device drivers on Computer1 – Enable Credential Guard on Computer2.– Run commands and cmdlets remotely on computer2.– Configure User Account control (UAC) on Computer3 to prompt administrators for credentials when elevated privileges are required.– Ensure that User1 can view and interact with a desktop session of User3. – Ensure that User2 can use Telnet to manage the mainframe.– Ensure that User4 can use Remote Desktop to access Computer4 remotely.You need to meet the requirement of User2. What should you do?

Answer: BExplanation:Install a Windows feature. Windows 10 does not come with telnet pre-installed. C is incorrect because telent is on the mainframe. Adding a user to the TelnetClients group on a Windows server would not do anything for the mainframe.

QUESTION 28Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.A user named User1 works from home and has a desktop computer that runs Windows 10 Pro. User1 has an application named App1 that requires access to a server on the corporate network. User1 creates a VPN connection on the computer.You need to ensure that when User1 opens App1, App1 can access the required data.What should you do?

A. Click Turn on password protected sharing.B. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnection Trigger Application cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.F. Run the New-VpnConnection cmdlet.G. Run the Set-NetConnection Profile cmdlet.H. Run the Set-VPNConnection cmdlet.

Answer: DExplanation:Add-VpnConnectionTriggerApplication. Setting Add-VpnConnectionTriggerApplication allows App1 to automatically request the VPN connection to ensure it can access the required data.

QUESTION 29Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. You have 10 computers that run Windows 10 Pro. The computers are in a workgroup. A computer named PC_User1 has shared folder named Share1. Users are not prompted for credentials when they access Share1.You modify the permissions on Share1 so that the share is shared only to a user named User1. You need to ensure that when users from other computers in the workgroup access Share1, they must authenticate by using the credentials of User1.What should you do?

A. Click Turn on password protected sharing.B. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnectionTriggerApplication cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.F. Run the New-VpnConnection cmdlet.G. Run the Set-NetConnectionProfile cmdlet.H. Run the Set-VPNConnection cmdlet.

QUESTION 30Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. Your network contains a single Active Directory domain. The domain contains a VPN server that supports all of the VPN protocols.From a computer that runs Windows 10 Pro, a user named User1 creates an SSTP VPN connection to a network named VPN1.User1 successfully connects to the VPN server. When User1 roams between different Wi-Fi access points, the user loses the connection to the corporate network and must manually re-establish the VPN connection.You need to ensure that VPN1 automatically maintains the connection while the user roams between Wi-Fi access points.What should you do?

A. Click Turn on password protected sharing.B. Disable Network Discovery.C. Modify the Profile settings of an incoming firewall rule.D. Run the Add-VpnConnectionTriggerApplication cmdlet.E. Run the New-NetFirewallRule cmdlet and specify the- Direction Outbound parameter.F. Run the New-VpnConnection cmdlet.G. Run the Set-NetConnectionProfile cmdlet.H. Run the Set-VPNConnection cmdlet.

Answer: H

QUESTION 31Note: This question is part of a series of questions that use the same set of answer choices. Each answer choice may be used once, more than once, or not at all. You have a computer named Computer1 that has storage configured as shown in the following table.Pool1 contains a storage space named Space1 that is 300 GB. Pool3 contains a storage space named Space2 that is 100 GB.Pool2 is empty.You need to add Disk6 to Poo1. What should you use?